Blogs | AlienVault
The AlienVault Blogs: Taking On Today’s Threats
Latest

The most recent posts from across the AlienVault blogs.

Subscribe: Via Email | RSS

Labs

Late-breaking discoveries and in-depth analysis.

Subscribe: Via Email | RSS

How-To

Practical, how-to advice, tips and guidance.

Subscribe: Via Email | RSS

BackgroundDaserf is an example of a backdoor, malware that provides attackers with access to the compromised system. It’s commonly used for data theft, as you can see from the number of AlienVault blog posts that include the term.The Daserf malware has been around for about 10 years, created by a low-profile team that the security response crew… Read more

Tags: malware, otx, backdoor, daserf

Technology foraging, or searching for smart ideas and technologies, is a key element of research and development both in the public and private sectors. It serves as a basis for discoveries of new products, applications, and processes brought to the marketplace. There are many hidden treasures yet to be discovered, commercialized, licensed and integrated into technology solutions. Foraging can impact… Read more

Tags: cybersecurity, dhs, nsa, darpa

From: Thomas, Kevin Sent: 24 August 2011 10:43To: Malik, Javvad Subject: EncryptionJavI’m updating the presentation pack for this month’s management meeting. Can you send me a short description of encryption so the SLT can better understand the solution?Kev From: Malik, Javvad Sent: 24 August 2011 11:03To: Thomas, Kevin Subject: EncryptionHi Kevin,Encryption is the process… Read more

Tags: pki, encryption, senior management, hash

A roundup of the week’s news, commentary, and observations.We missed last week’s edition as we were at Blackhat and BsidesLV. If you weren’t attending or missed us at the event, Kate managed to capture some of the impressions.Gartner announced its 2016 Magic Quadrant for SIEM and AlienVault once again remained a visionary. I… Read more

Tags:

Me irlNot a day goes by in my life where I don’t use Google search. Nothing is easier than loading up the page, typing in a phrase, and seeing 650,000 related articles come back to you -- but therein lies the problem. Google is an amazing tool but tends to over-deliver unless you’re very specific and… Read more

Tags: penetration testing, google hacking, google dorking

Get Email Updates

Labs Research
Security Essentials
All Blogs

Gartner MQ

Featured Content

Chat